Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

[1]  Samuel B. Griffith The Chinese People's Liberation Army , 1968 .

[2]  Juan Andres Guerrero-Saade WALKING IN YOUR ENEMY’S SHADOW: WHEN FOURTH-PARTY COLLECTION BECOMES ATTRIBUTION HELL , 2017 .

[3]  Göran Rossholm,et al.  Languages of Art , 1998 .

[4]  B. Buchanan,et al.  Attributing Cyber Attacks , 2015 .

[5]  Matt Pietrek,et al.  Peering Inside the PE: A Tour of the Win32 Portable Executable File Format , 1994 .

[6]  I. Borogan,et al.  The New Nobility , 2010 .

[7]  Boundless Informant : the NSA ' s secret tool to track global surveillance data , .

[8]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[9]  J. Alex Halderman,et al.  A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.

[10]  D. A. Petkus Ethics of Human Intelligence Operations: Of MICE and Men , 2010 .

[11]  Juan Andrés Guerrero-Saade THE ETHICS AND PERILS OF APT RESEARCH: AN UNEXPECTED TRANSITION INTO INTELLIGENCE BROKERAGE , 2015 .

[12]  Tim Weiner,et al.  Legacy of Ashes: The History of the CIA , 2007 .

[13]  Emil Vassev,et al.  Use Cases , 2010, Encyclopedia of Software Engineering.

[14]  Michael T. Flynn,et al.  Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan , 2010 .

[15]  M. Schmitt The Netherlands releases a Tour de Force on international law in cyberspace: analysis , 2019 .

[16]  Sergio Caltagirone,et al.  The Diamond Model of Intrusion Analysis , 2013 .

[17]  Brian Bartholomew,et al.  WAVE YOUR FALSE FLAGS ! DECEPTION TACTICS MUDDYING ATTRIBUTION IN TARGETED ATTACKS , 2016 .

[18]  William Howlett Iv The Rise of China's Hacking Culture: Defining Chinese Hackers , 2016 .